General
-
Target
b5ffd4ecdf7f1d4eb5f13a7207c5e4a5.exe
-
Size
1.1MB
-
Sample
201109-yv12rnxz9a
-
MD5
b5ffd4ecdf7f1d4eb5f13a7207c5e4a5
-
SHA1
145b3ed98ffe2ca15172dcabf52a76ecd33bd657
-
SHA256
615b9395be665d265953e69924b4df1808eda0fd40381d6d469bf4c362590125
-
SHA512
8e918bc2304f7e761736d2c03494bf278c854fdfb30ec7d7459fd1cfbcdd88c279396d55d0d8954389d742d6e3f46b99bb93dbce3137c26d1ca95e3ee8c93ea3
Behavioral task
behavioral1
Sample
b5ffd4ecdf7f1d4eb5f13a7207c5e4a5.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b5ffd4ecdf7f1d4eb5f13a7207c5e4a5.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
b5ffd4ecdf7f1d4eb5f13a7207c5e4a5.exe
-
Size
1.1MB
-
MD5
b5ffd4ecdf7f1d4eb5f13a7207c5e4a5
-
SHA1
145b3ed98ffe2ca15172dcabf52a76ecd33bd657
-
SHA256
615b9395be665d265953e69924b4df1808eda0fd40381d6d469bf4c362590125
-
SHA512
8e918bc2304f7e761736d2c03494bf278c854fdfb30ec7d7459fd1cfbcdd88c279396d55d0d8954389d742d6e3f46b99bb93dbce3137c26d1ca95e3ee8c93ea3
Score10/10-
Modifies WinLogon for persistence
-
Buer Loader
Detects Buer loader in memory or disk.
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-